Analysis

  • max time kernel
    106s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    27-04-2022 18:25

General

  • Target

    f9e8d17a5b0ed4a95a778824e93609c534db70e30fb4beeccea2907d9488bd46.exe

  • Size

    1.2MB

  • MD5

    66045ebf6e3b8a7898b38e4dc0a9345d

  • SHA1

    b4981cea040a229620ef1447cfc75acf9d90a7ce

  • SHA256

    f9e8d17a5b0ed4a95a778824e93609c534db70e30fb4beeccea2907d9488bd46

  • SHA512

    08c867cea58195b0d015163f7667f5e794dd2ff74a17469a49a7a9b36070cc9cd646ae6b05e28598a734865cef728461282cc445365a7b460c37294282e06a99

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9e8d17a5b0ed4a95a778824e93609c534db70e30fb4beeccea2907d9488bd46.exe
    "C:\Users\Admin\AppData\Local\Temp\f9e8d17a5b0ed4a95a778824e93609c534db70e30fb4beeccea2907d9488bd46.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Program Files (x86)\internet explorer\iexplore.exe
      "C:\Program Files (x86)\internet explorer\iexplore.exe" http://
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2016
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1540
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\del32.bat
      2⤵
      • Deletes itself
      PID:1500

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\DJ7KP0JU.txt
    Filesize

    605B

    MD5

    d988e07bd6e81f92eeb6df3a1722867e

    SHA1

    706d3ba3e03aea8eb53fbf43bda04aab2eb578ea

    SHA256

    495d2fe53949ada70f085e6501d3446f1020c64542623e102d61ed072efee781

    SHA512

    f3ad4d03d0094e54a5d56fbacb8437dbd18405a04609fc09dbe2a88a4e6e20454eb7fc414782be7dda354b72562603aa2a1044252cfce4c6e209d9abfad785b2

  • C:\Windows\SysWOW64\del32.bat
    Filesize

    174B

    MD5

    325d18ebf3a7607a849dc90b94bb4ac5

    SHA1

    197974cb26fe23c10c872bda300d063e96ac7c49

    SHA256

    558cacdb33fe2a5bc9cd8ec01cc7bb5b3fc3adde64826dbeb6ec903fb8b9304e

    SHA512

    36f857efe2e41a02440b83f6dc77d4338ffe2b60a4dfd9c4ef1698bc9f843bb8ffab5106f11a7f42a61ee035ec620e4d9494d31de4d6e7eb4480d567f1c26b19

  • \Windows\SysWOW64\wsock32.sys
    Filesize

    159KB

    MD5

    e542cc1875d57544eb2382faf41573b1

    SHA1

    e23d5915349d5772f23180dfa2c2cac2c0b8d14e

    SHA256

    0a907a6bb00f24dffa890786c2b0ac06bfb09a9bd79294c1181957108ba828ac

    SHA512

    5c59a3532e6fe273e954a5161cc095be463377426cb4c6f948d566f833ba7558b437742fa5ee261f7dd31c611ce2bc8092df6ad04f1dc50ed4d0118c75f59468

  • memory/852-56-0x00000000002E0000-0x00000000003C8000-memory.dmp
    Filesize

    928KB

  • memory/852-58-0x0000000004620000-0x0000000004623000-memory.dmp
    Filesize

    12KB

  • memory/852-57-0x0000000000400000-0x0000000000689000-memory.dmp
    Filesize

    2.5MB

  • memory/1500-60-0x0000000000000000-mapping.dmp